Question

In: Economics

In the Kutz (2016) textbook, there are descriptions of five types of applications of Web 2.0....

In the Kutz (2016) textbook, there are descriptions of five types of applications of Web 2.0. Pick any two types and find two URLs that represent them. Please briefly describe each and explain how they promote e-commerce.

Solutions

Expert Solution

Among the five types of applications of Web 2.0 say forums, social bookmarking, social networking services, micro-blogging and social curators, I chose the below two of them for the further explanation:

1. Social networking services: E.g Facebook.com is a social networking platform which is used to develop personal connections and thereby targeting ads, exclusive Facebook content, it helps to promote e-commerce. This is done purely through individual connections when compared to Instagram promotions which is rather done highly through influence and themes.

2. Social Curators: E.g Instagram.com is a platform to share photos and videos through which various themes are collaborated and shared to glorify around one or more kinds of topics. And that can be used to promote various business or say e commerce. Instagram is used highly for influencing audience or say customer to boost up the sales through its interface using various kinds of themes and designs.

* Content marketing is used to mainly to scale up the sales in both of the applications mentioned above.


Related Solutions

Describe your vision of Web 3.0 and relate it to Web 2.0.
Describe your vision of Web 3.0 and relate it to Web 2.0.
Researching Applications of RFID. Visit the Web and perform a search on RFID for applications that...
Researching Applications of RFID. Visit the Web and perform a search on RFID for applications that we didn’t discuss in this chapter. Also, search the Web for the leading provider of RFID technologies. What companies did you find? Does one seem to stand out above the rest? If so, which is it?
Research information on how Python is used for Web applications and accessing resources on the Web?...
Research information on how Python is used for Web applications and accessing resources on the Web? Please help me for short discussion. Thanks in advance.
What are three of your favorite Web 2.0 technologies or Web sites? Explain what is so...
What are three of your favorite Web 2.0 technologies or Web sites? Explain what is so great about each of them and how they might be improved. (Dont copy previous answers)
How should we start using Web 2.0 tools
How should we start using Web 2.0 tools
Please discuss the difference between Web 2.0 and Web 3.0 with the references. About 300-500 words
Please discuss the difference between Web 2.0 and Web 3.0 with the references. About 300-500 words
Using your textbook, answer the following questions; 11. What are the five types of shoplifters? 12....
Using your textbook, answer the following questions; 11. What are the five types of shoplifters? 12. Burglary victims often struggle ____________________ afterward. 13. What is the most common weapon used in an armed robbery? 14. When burglary tools are found at a crime scene, they most often will be similar to; Circumstantial real
what are the four main types of technical descriptions
what are the four main types of technical descriptions
Please match the types of sampling approaches to their descriptions
Please match the types of sampling approaches to their descriptionsSnowball samplingPurposive samplingQuota samplingSystematic samplingSimple random samplingSampling to meet predefined proportions standards.Sampling that specifies pre-established criteria based on the intentions or goal of the study.Sampling that uses a predefined pattern or system to identify participates after the selection of the first participant.Sampling where each member of the target population has an equal chance of selection.Sampling by using referrals from previous participants.
Discuss what web applications are and how they differ from other operating system based applications (include...
Discuss what web applications are and how they differ from other operating system based applications (include the role of IIS) Also, explore at least three vulnerabilities to utilizing web applications on a web server. 200 words or more, please.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT